CVE-2023-3776
Linux Kernel vulnerability analysis and mitigation

Overview

A use-after-free vulnerability was discovered in the Linux kernel's net/sched: clsfw component (CVE-2023-3776). The vulnerability affects Linux kernel versions from 2.6 through versions prior to 6.5. The issue was discovered in July 2023 and occurs when tcfchangeindev() fails, causing fwsetparms() to return an error after modifying the reference counter in tcfbind_filter() (NVD, CVE).

Technical details

The vulnerability exists in the net/sched: clsfw component of the Linux kernel. If tcfchangeindev() fails, fwsetparms() will immediately return an error after incrementing or decrementing the reference counter in tcfbind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free condition. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability can be exploited to achieve local privilege escalation. Successful exploitation could lead to disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS). The vulnerability requires local access and low privileges to exploit (NetApp Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Linux kernel commit 0323bce598eea038714f941ce2b22541c46d488f. The fix involves moving the point of possible failure above the point where the TCFWCLASSID is handled. Users are recommended to upgrade their systems to kernel versions containing this fix. For systems that cannot be immediately updated, one mitigation is to disable the ability for unprivileged users to create namespaces by setting kernel.unprivilegedusernsclone=0 (Kernel Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management